From the Publisher: Java RMI contains a wealth of experience in designing and implementing Java's Remote Method Invocation. If you're a novice reader, you will quickly be brought up to speed on why RMI is s...
详细信息
ISBN:
(纸本)9781565924529
From the Publisher: Java RMI contains a wealth of experience in designing and implementing Java's Remote Method Invocation. If you're a novice reader, you will quickly be brought up to speed on why RMI is such a powerful yet easy to use tool for distributed programming, while experts can gain valuable experience for constructing their own enterprise and distributed systems. With Java RMI , you'll learn tips and tricks for making your RMI code excel. The book also provides strategies for working with serialization, threading, the RMI registry, sockets and socket factories, activation, dynamic class downloading, HTTP tunneling, distributed garbage collection, JNDI, and CORBA. In short, a treasure trove of valuable RMI knowledge packed into one book.
Any change in resource planning may lead to change in project duration and resources cost which will impact the total cost of the project when risk factors are taken into account. A neural network model for resource s...
详细信息
Any change in resource planning may lead to change in project duration and resources cost which will impact the total cost of the project when risk factors are taken into account. A neural network model for resource scheduling to minimize the total cost of a project was proposed to improve the situation and Morte Carlo simulation and genetic algorithm were used to solve it. A case study based on the Neural network model shows the optimization model is better than the Critical Path Method (CPM) network model.
Existing code update protocols target efficiency and assume correct behavior from participating sensor nodes. This work aims for the progressive, resource sensitive verification of code updates in sensor networks to e...
详细信息
ISBN:
(纸本)9781595930545
Existing code update protocols target efficiency and assume correct behavior from participating sensor nodes. This work aims for the progressive, resource sensitive verification of code updates in sensor networks to ensure that unauthorized updates from malicious nodes are not propagated, while correct updates continue to be efficiently disseminated.
The article focuses on the development of the Operations Research Software Exchange Program, a system that offers possibilities for teaching, checking up knowledge and applications of network optimization. The basic t...
详细信息
The article focuses on the development of the Operations Research Software Exchange Program, a system that offers possibilities for teaching, checking up knowledge and applications of network optimization. The basic topics covered are dual graphs, Eulerian cycles, optimum spanning trees, critical paths, maximum flows, minimum cost flows and other problems. The aim of the course is to get more familiar with certain basic problems and algorithms using a personal computer. All variants have a cyclic structure and it is possible to solve a large number of examples.
Minimum cost network flow problems with a piecewise linear convex cost function are used to model various optimization problems. They are also used extensively to approximate nonlinear cost functions which may otherwi...
详细信息
Blockage is a kind of phenomenon frequently occurred in a transport network, in which the human beings are the moving subjects. The minimum flow of a network defined in this paper means the maximum flow quantity throu...
详细信息
Blockage is a kind of phenomenon frequently occurred in a transport network, in which the human beings are the moving subjects. The minimum flow of a network defined in this paper means the maximum flow quantity through the network in the seriously blocked situation. It is an important parameter in designing and operating a transport network, especially in an emergency evacuation network. A branch and bound method is presented to solve the minimum flow problem on the basis of the blocking flow theory and the algorithm and its application are illustrated by examples.
暂无评论